EP2809046B1 - Zuordnung unterschiedlicher Sicherheitsmodi mit unterschiedlichen drahtlosen Authenticators - Google Patents
Zuordnung unterschiedlicher Sicherheitsmodi mit unterschiedlichen drahtlosen Authenticators Download PDFInfo
- Publication number
- EP2809046B1 EP2809046B1 EP14170206.8A EP14170206A EP2809046B1 EP 2809046 B1 EP2809046 B1 EP 2809046B1 EP 14170206 A EP14170206 A EP 14170206A EP 2809046 B1 EP2809046 B1 EP 2809046B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- security mode
- wireless
- resources
- authenticator
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 claims description 32
- 230000007246 mechanism Effects 0.000 claims description 23
- 230000003993 interaction Effects 0.000 claims description 18
- 230000004044 response Effects 0.000 claims description 10
- 238000004891 communication Methods 0.000 description 39
- 230000015654 memory Effects 0.000 description 19
- 230000008569 process Effects 0.000 description 10
- 238000000926 separation method Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 238000001514 detection method Methods 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000013515 script Methods 0.000 description 4
- 230000007423 decrease Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000005021 gait Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000033001 locomotion Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 210000001525 retina Anatomy 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/086—Access security using security domains
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
Definitions
- NFC Near Field Communication
- RFID Radio Frequency Identification
- NFC technology enables data exchange between devices at a distance of approximately four to approximately ten centimeters, at rates of approximately 100 kbps.
- NFC-enabled devices can be made to transfer information between devices by simply placing them near each other. For example, "tapping" or otherwise bringing two NFC-enabled devices within range of each other may cause one or both of the devices to send data to the other device.
- the interface 106 comprises a proximity-activated wireless interface, for example, NFC interface, Bluetooth interface, or any additional or different types of proximity-activated wireless interfaces.
- the conditions under which the interface 106 detects proximity of the second or third wireless device 115a, 115b may depend on settings or attributes of the particular wireless device.
- the interface 106 may detect proximity based on receiving signals having a signal-to-noise ratio greater than a threshold level.
- the conditions under which proximity can be detected may depend on the physical orientations of the wireless devices, physical attributes of their environment, and other considerations.
- the information 118a, 118b may be encrypted before communicated to the first device 105.
- the encryption can provide confidentiality in the data communications between the first device 105 and the second wireless device 115a or the third wireless device 115b.
- the security modes 114 can comprise, for example, a database that includes a list of security modes, accessibility attributes or security properties of the security modes, or additional or different information as appropriate.
- a security mode can define accessibility attributes of resources on the first device 105. Based on a particular security mode, the first device can grant or decline external access to certain resources on the first device 105 according to the accessibility attributes.
- a security mode can include multiple security parameters that define accessibility attributes of the resources on the first device 105.
- the accessibility attributes can include one or more of a timeout attribute, an authentication attribute, a resource attribute, or any additional or different types of attribute.
- the example second wireless device 115a and the example third wireless device 115b shown in FIG. 1 include encoded information 116a and encoded information 116b, respectively.
- the example second wireless device 115a and third wireless device 115b may include additional or different components, for example, a processor, a memory, an interface, or any other appropriate module or apparatus.
- the second wireless device 115a and the third wireless device 115b each may include a single digital or analog circuitry with appropriate memory, processor, interface, software, hardware, firmware or a combination of these and other types of apparatus.
- the second wireless device 115a and the third wireless device 115b can have identical, similar, or different structures or configurations.
- the identifier may include information that identifies one or more of a security mode (e.g., a security mode of the first device 105), device (e.g., the second wireless device 115a or the third wireless device 115b), location, address, component, and user of a device, or any attribute of the device, security mode, location, address, component, and user of the device.
- the link can be a link to content accessible by the Internet, a link to content accessible on a local area network, a link to content stored on a device (e.g., device 105, 115a, or 115b) or another type of link. In some instances, the link can be in the form of a uniform resource locator (URL).
- URL uniform resource locator
- the second wireless device 115a, the third wireless device 115b, or both can be devices or articles attached with QR codes.
- each of the QR codes can encode information that can be associated to a distinct security mode on the first device 105.
- the authentication module 112 may identify corresponding security mode information based on the QR codes, and apply the corresponding decoded security mode on the first device 105. Additional or different operations can be performed before, during, or after the interactions between the first device 105 and the second wireless device 115a or the third wireless device 115b.
- the second wireless device 115a or the third wireless device 115b can comprise any other type of appropriate devices or articles (e.g., a fob, a card, a key, a token, etc.) with encoded authentication information (e.g., a barcode, an identifier, or any other type of machine-readable representation of data).
- the first device 105 can include an appropriate interface (e.g., the interface 106) facilitating interactions and communications between the first device 105 and the second wireless device 115a or the third wireless device 115b.
- multiple security modes of the first device may be paired or otherwise associated with the respective wireless authenticator device.
- the associating can be made based on, for example, a location of the respective wireless authenticator device, a type of user to whom the respective wireless authenticator device is assigned, or any other appropriate criterion.
- the multiple security modes may include a game security mode, a child security mode, a home security mode, a work security mode, or another security mode.
- a wireless authenticator assigned to a child can be associated with a child security mode, where the child can only access certain resources (e.g., content, applications, data, etc.) in the first device for a certain amount of time configured by the child's parent for instance.
- the second security mode is applied in the first device.
- the first device can apply the second security mode by securing the resources of the first device according to the accessibility attributes (e.g., a timeout attribute, an authentication attribute, a resource attribute, etc.) defined in the second security mode.
- the accessibility attributes e.g., a timeout attribute, an authentication attribute, a resource attribute, etc.
- the first device can secure the resources according to the second security mode for the time duration indicated by the timeout attribute.
- the second security mode includes an authentication attribute
- the first device can secure the resources according to the second security mode by requesting for the authentication mechanism as indicated in the authentication attribute and verifying receipt of the authentication mechanism before allowing the resources to be accessed external to the first device.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Claims (14)
- Authentifizierungsverfahren mit:Erfassen (306) von Information (116a, 116b), die in einer Drahtlosauthentifizierervorrichtung (115a, 115b) codiert ist, an einer ersten Vorrichtung (105) auf der Grundlage einer Drahtlosinteraktion zwischen der ersten Vorrichtung und der Drahtlosauthentifizierervorrichtung, wobei die erste Vorrichtung die Information erfasst (306), die in der Drahtlosauthentifizierervorrichtung codiert ist, während sie Ressourcen auf der ersten Vorrichtung nach einem ersten Sicherheitsmodus schützt (304),Auswählen (308) eines zweiten Sicherheitsmodus, der mit der Drahtlosauthentifizierervorrichtung verknüpft ist, auf der Grundlage des Erfassens der Information, wobei der zweite Sicherheitsmodus einen aus einer Vielzahl von verschiedenen Sicherheitsmodi (114) aufweist, wobei jeder der Vielzahl von verschiedenen Sicherheitsmodi mit einerjeweiligen aus einer Vielzahl von Drahtlosauthentifizierervorrichtungen verknüpft ist und Zugreifbarkeitsattribute der Ressourcen für die erste Vorrichtung festlegt, dadurch gekennzeichnet, dass mindestens der zweite Sicherheitsmodus ein Authentifizierungsattribut festlegt, das einen Authentifizierungsmechanismus angibt, der benötigt wird, bevor erlaubt wird, dass auf die Ressourcen von außerhalb der ersten Vorrichtung zugegriffen werden kann,Anwenden (310) des ausgewählten zweiten Sicherheitsmodus auf der ersten Vorrichtung undVerifizieren eines Empfangs des Authentifizierungsmechanismus, bevor erlaubt wird, dass auf die Ressourcen von außerhalb der ersten Vorrichtung zugegriffen werden kann,wobei der Authentifizierungsmechanismus mindestens zum Teil auf der Grundlage eines Ortes der Drahtlosauthentifizierervorrichtung konfiguriert ist.
- Authentifizierungsverfahren nach Anspruch 1, wobei der Authentifizierungsmechanismus mindestens zum Teil auf der Grundlage einer Autoritätsstufe eines Benutzers der ersten Vorrichtung konfiguriert ist.
- Authentifizierungsverfahren nach Anspruch 1 oder 2, wobei der Authentifizierungsmechanismus eines oder mehrere aus einer persönlichen Identifikationsnummer, einem Passwort, einem Schnellantworts- bzw. Quick-Response-Code, einem Barcode, einem grafischen Authentifizierer, einer Geste, biometrischen Daten oder einer weiteren Authentifizierervorrichtung enthält.
- Authentifizierungsverfahren nach einem der vorhergehenden Ansprüche, ferner mit Verknüpfen (302) jedes der Vielzahl von verschiedenen Sicherheitsmodi (114) mit der jeweiligen der Vielzahl von verschiedenen Drahtlosauthentifizierervorrichtungen (115a, 115b).
- Authentifizierungsverfahren nach Anspruch 4, wobei das Verknüpfen jedes der Vielzahl von verschiedenen Sicherheitsmodi (114) mit derjeweiligen der Vielzahl von verschiedenen Drahtlosauthentifizierervorrichtungen zumindest zum Teil auf einen Ort derjeweiligen der Vielzahl von verschiedenen Drahtlosauthentifizierervorrichtungen basiert.
- Authentifizierungsverfahren nach einem der vorhergehenden Ansprüche, wobei die Sicherheitsmodi (114) einen oder mehrere aus einem Spielsicherheitsmodus, einem Kindersicherheitsmodus, einem Heimsicherheitsmodus oder einem Arbeitssicherheitsmodus aufweisen.
- Authentifizierungsverfahren nach einem der vorhergehenden Ansprüche, wobei auf die Ressourcen von außerhalb der ersten Vorrichtung nicht zugegriffen werden kann, wenn die Ressourcen nach dem ersten Sicherheitsmodus geschützt sind, und nach Anwenden des ausgewählten zweiten Sicherheitsmodus von außerhalb der ersten Vorrichtung auf die Ressourcen zugegriffen werden kann.
- Authentifizierungsverfahren nach einem der vorhergehenden Ansprüche, wobei der zweite Sicherheitsmodus ein Auszeitattribut festlegt, wobei das Auszeitattribut einen Zeitparameter zum Schützen der Ressourcen nach dem zweiten Sicherheitsmodus angibt, und das Verfahren ferner ein Schützen der Ressourcen auf der ersten Vorrichtung nach dem zweiten Sicherheitsmodus und ferner nach dem Auszeitattribut aufweist.
- Authentifizierungsverfahren nach Anspruch 8, wobei der Zeitparameter eine oder mehrere Zeitperioden von einem Tag festlegt.
- Authentifizierungsverfahren nach einem der vorhergehenden Ansprüche, wobei der zweite Sicherheitsmodus eine Untermenge von Ressourcen festlegt, auf die von außerhalb der ersten Vorrichtung zugegriffen werden kann, wenn die Ressourcen nach dem zweiten Sicherheitsmodus geschützt sind, und das Verfahren ein Bereitstellen von Zugriff auf die Untermenge der Ressourcen aufweist, während ein Zugriff auf andere Ressourcen auf der ersten Vorrichtung verhindert wird.
- Authentifizierungsverfahren nach Anspruch 10, wobei die Untermenge mindestens eines aus einem Perimeter, einer Anwendung, einer Datei oder einer Netzressource enthält.
- Authentifizierungsverfahren nach einem der vorhergehenden Ansprüche, wobei das Erfassen von Information, die in der Drahtlosauthentifizierervorrichtung codiert ist, ein Erfassen einer Nähe der Drahtlosauthentifizierervorrichtung aufweist.
- Ein oder mehrere computerlesbare Medien mit Anweisungen, die von einem oder mehreren datenverarbeitenden Geräten ausführbar sind, um das Verfahren nach einem der vorhergehenden Ansprüche durchzuführen.
- Vorrichtung, die dazu konfiguriert ist, das Verfahren nach einem der Ansprüche 1 bis 12 durchzuführen.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/904,698 US9552472B2 (en) | 2013-05-29 | 2013-05-29 | Associating distinct security modes with distinct wireless authenticators |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2809046A1 EP2809046A1 (de) | 2014-12-03 |
EP2809046B1 true EP2809046B1 (de) | 2017-02-22 |
Family
ID=50927912
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP14170206.8A Active EP2809046B1 (de) | 2013-05-29 | 2014-05-28 | Zuordnung unterschiedlicher Sicherheitsmodi mit unterschiedlichen drahtlosen Authenticators |
Country Status (2)
Country | Link |
---|---|
US (1) | US9552472B2 (de) |
EP (1) | EP2809046B1 (de) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140358552A1 (en) * | 2013-05-31 | 2014-12-04 | Cirrus Logic, Inc. | Low-power voice gate for device wake-up |
KR20150049596A (ko) * | 2013-10-30 | 2015-05-08 | 삼성전자주식회사 | 보안 입력 방법 및 그 전자 장치 |
US9992327B1 (en) * | 2014-01-03 | 2018-06-05 | Amazon Technologies, Inc. | Interaction lock mode for mobile devices |
US9692879B1 (en) | 2014-05-20 | 2017-06-27 | Invincea, Inc. | Methods and devices for secure authentication to a compute device |
CN111031033B (zh) * | 2014-06-13 | 2022-08-16 | 柏思科技有限公司 | 用于管理节点的方法和系统 |
US9697385B2 (en) | 2014-06-20 | 2017-07-04 | Google Inc. | Security adjustments in mobile devices |
CN105488869A (zh) * | 2014-09-16 | 2016-04-13 | 深圳富泰宏精密工业有限公司 | 密码锁开锁系统及方法 |
US10333980B2 (en) | 2014-11-19 | 2019-06-25 | Imprivata, Inc. | Personal device network for user identification and authentication |
US9699594B2 (en) * | 2015-02-27 | 2017-07-04 | Plantronics, Inc. | Mobile user device and method of communication over a wireless medium |
EP3289792B1 (de) | 2015-05-01 | 2020-06-24 | Assa Abloy AB | Kontinuierliche authentifizierung |
JP2016224522A (ja) * | 2015-05-27 | 2016-12-28 | 京セラ株式会社 | 端末装置およびサービスサーバ |
US9813402B1 (en) * | 2016-01-08 | 2017-11-07 | Allstate Insurance Company | User authentication based on probabilistic inference of threat source |
US20180122217A1 (en) * | 2016-10-27 | 2018-05-03 | Lenovo (Singapore) Pte. Ltd. | Detecting Wireless Signals to Engage Security System Awareness |
CN107392056A (zh) * | 2017-07-31 | 2017-11-24 | 广东欧珀移动通信有限公司 | 终端及儿童模式实现方法、计算机可读存储介质 |
US20190069436A1 (en) * | 2017-08-23 | 2019-02-28 | Hewlett Packard Enterprise Development Lp | Locking mechanism of a module of a data center |
FR3100635B1 (fr) * | 2019-09-10 | 2021-08-06 | Schneider Electric Ind Sas | Système de sécurisation d’un dispositif |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7428411B2 (en) * | 2000-12-19 | 2008-09-23 | At&T Delaware Intellectual Property, Inc. | Location-based security rules |
US20020123325A1 (en) | 2001-03-01 | 2002-09-05 | Cooper Gerald M. | Method and apparatus for increasing the security of wireless data services |
US7400878B2 (en) | 2004-02-26 | 2008-07-15 | Research In Motion Limited | Computing device with environment aware features |
CN1969579A (zh) * | 2004-06-10 | 2007-05-23 | 松下电器产业株式会社 | 从rfid标签接收数据的移动终端及移动终端的控制策略确定方法 |
JP4363361B2 (ja) * | 2005-04-28 | 2009-11-11 | 沖電気工業株式会社 | 携帯用電子機器,セキュリティシステムおよび携帯用電子機器の動作許可範囲決定方法 |
US8078990B2 (en) | 2006-02-01 | 2011-12-13 | Research In Motion Limited | Secure device sharing |
EP1895750B1 (de) | 2006-09-01 | 2010-06-16 | Research In Motion Limited | Verfahren zur ortsabhängigen Sperrung von Funktionen eines Mobilfunkendgerätes, und Vorrichtung dafür |
US7742995B2 (en) | 2007-03-23 | 2010-06-22 | Mastercard International, Inc. | Pre-authenticated identification token |
EP2182493A1 (de) | 2008-11-04 | 2010-05-05 | Gemalto SA | Remote-Benutzerauthentifizierung mit NFC |
EP2378748B1 (de) | 2010-02-26 | 2018-04-11 | BlackBerry Limited | Drahtloses Kommunikationssystem mit mobiler Umleitung zur Mobilgerätauthentifizierung basierend einer vom Benutzer tragbaren Sicherheitsvorrichtung und zugehörige Verfahren |
EP2364004A1 (de) | 2010-02-26 | 2011-09-07 | Research In Motion Limited | Kommunikationsvorrichtung, die auf Nahfeldkommunikationen reagiert, um auf gesperrte und nicht gesperrte Betriebsmodi zuzugreifen |
EP2364006B1 (de) | 2010-02-26 | 2013-06-19 | Research In Motion Limited | Nahfeldkommunikationssystem mit mobilen drahtlosen Kommunikationsvorrichtungsfunktionen basierend auf Zeitpunkt und Sequenz der NFC-Sensorkommunikation und zugehörige Verfahren |
CA2811839C (en) | 2010-09-24 | 2017-09-05 | Research In Motion Limited | Method and apparatus for differentiated access control |
EP2442600B1 (de) | 2010-10-14 | 2013-03-06 | Research In Motion Limited | Nahfeldkommunikationssystem mit Bereitstellung der geografischen Authentifizierung der Position eines Nahfeldkommunikationsetiketts und zugehörige Verfahren |
AU2011202832B2 (en) | 2010-12-21 | 2013-01-24 | Lg Electronics Inc. | Mobile terminal and method of controlling a mode switching therein |
US8929861B2 (en) | 2011-02-24 | 2015-01-06 | Blackberry Limited | Personnel access system with verification features utilizing near field communication (NFC) and related methods |
US8509808B2 (en) * | 2011-03-29 | 2013-08-13 | Research In Motion Limited | Mobile wireless communications device having a near field communication (NFC) device and providing memory disabling and related |
US10223743B2 (en) | 2011-03-29 | 2019-03-05 | Blackberry Limited | Communication system providing near field communication (NFC) transaction features and related methods |
EP2506203B1 (de) | 2011-03-29 | 2013-06-19 | Research In Motion Limited | Kommunikationssystem mit Nahfeldkommunikationstransaktionsmerkmalen und zugehörige Verfahren |
US20120329388A1 (en) | 2011-06-27 | 2012-12-27 | Broadcom Corporation | NFC-Enabled Devices to Store and Retrieve Portable Application-Specific Personal Information for Use with Computational Platforms |
EP2732651B1 (de) | 2011-07-11 | 2018-09-05 | BlackBerry Limited | Datenintegrität für die nähebasierte kommunikation |
CA2841063C (en) | 2011-07-11 | 2018-04-03 | Blackberry Limited | Data integrity for proximity-based communication |
US20130040561A1 (en) * | 2011-08-12 | 2013-02-14 | Ivo Conde e Silva | System and method for launching and/or downloading applications with near field communication tags |
US8624725B1 (en) * | 2011-09-22 | 2014-01-07 | Amazon Technologies, Inc. | Enhanced guidance for electronic devices having multiple tracking modes |
US9778837B2 (en) * | 2013-03-15 | 2017-10-03 | Apple Inc. | Mobile computing device with multiple access modes |
-
2013
- 2013-05-29 US US13/904,698 patent/US9552472B2/en active Active
-
2014
- 2014-05-28 EP EP14170206.8A patent/EP2809046B1/de active Active
Non-Patent Citations (1)
Title |
---|
None * |
Also Published As
Publication number | Publication date |
---|---|
EP2809046A1 (de) | 2014-12-03 |
US20140359750A1 (en) | 2014-12-04 |
US9552472B2 (en) | 2017-01-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2809046B1 (de) | Zuordnung unterschiedlicher Sicherheitsmodi mit unterschiedlichen drahtlosen Authenticators | |
CN110463161B (zh) | 用于访问受保护资源的口令状态机 | |
US10447839B2 (en) | Device locator disable authentication | |
US11093626B2 (en) | Security systems and methods for continuous authorized access to restricted access locations | |
US20180324166A1 (en) | Presence-based credential updating | |
US10205711B2 (en) | Multi-user strong authentication token | |
US20190130676A1 (en) | Configurable digital badge holder | |
US9706401B2 (en) | User-authentication-based approval of a first device via communication with a second device | |
US8656455B1 (en) | Managing data loss prevention policies | |
US20140282992A1 (en) | Systems and methods for securing the boot process of a device using credentials stored on an authentication token | |
US11038684B2 (en) | User authentication using a companion device | |
EP2696307A1 (de) | Systeme und Verfahren zur Steuerung des Benutzerzugriffs auf geschützte Ressourcen unter Verwendung von mehrstufiger Authentifizierung | |
WO2017112641A1 (en) | Dynamic management of protected file access | |
CA3103468A1 (en) | Systems and methods for secure access to property or information using blockchain | |
EP2927834A1 (de) | Informationsverarbeitungsvorrichtung, informationsverarbeitungsverfahren und aufzeichnungsmedium | |
WO2017112640A1 (en) | Obtaining a decryption key from a mobile device | |
WO2017112639A1 (en) | Encrypted synchronization | |
Yohan et al. | Dynamic multi-factor authentication for smartphone | |
KR20180132811A (ko) | 사용자와 모바일 단말기 및 추가 인스턴스 간의 보안 상호 작용을 위한 방법 | |
KR102010764B1 (ko) | 스마트폰 인증 기능을 이용한 컴퓨터 보안 시스템 및 방법 | |
Chantal et al. | A security analysis and reinforcement design adopting fingerprints over drawbacks of passwords based authentication in remote home automation control system | |
EP4203535A1 (de) | Systeme und verfahren zur gemeinsamen nutzung von berechtigungsnachweisen | |
CN104468173A (zh) | 一种软件系统安全设计的方法 | |
CN105404820A (zh) | 文件安全存取系统与方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20140528 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
17Q | First examination report despatched |
Effective date: 20151221 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 29/08 20060101ALN20160809BHEP Ipc: G06F 21/74 20130101ALN20160809BHEP Ipc: H04W 4/02 20090101ALN20160809BHEP Ipc: H04W 4/04 20090101ALI20160809BHEP Ipc: H04W 12/08 20090101ALI20160809BHEP Ipc: H04L 29/06 20060101AFI20160809BHEP Ipc: G06F 21/35 20130101ALI20160809BHEP Ipc: H04W 12/06 20090101ALN20160809BHEP |
|
INTG | Intention to grant announced |
Effective date: 20160906 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 870068 Country of ref document: AT Kind code of ref document: T Effective date: 20170315 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602014006858 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 4 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20170222 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 870068 Country of ref document: AT Kind code of ref document: T Effective date: 20170222 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170522 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170523 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170522 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170531 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170622 Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602014006858 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20171123 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170531 Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170531 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170528 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20170531 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170528 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 5 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170531 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170528 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20140528 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170222 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170622 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602014006858 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: H04L0029060000 Ipc: H04L0065000000 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 602014006858 Country of ref document: DE Ref country code: DE Ref legal event code: R081 Ref document number: 602014006858 Country of ref document: DE Owner name: MALIKIE INNOVATIONS LTD., IE Free format text: FORMER OWNER: BLACKBERRY LIMITED, WATERLOO, ONTARIO, CA |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20240521 Year of fee payment: 11 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20240529 Year of fee payment: 11 |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: 732E Free format text: REGISTERED BETWEEN 20240620 AND 20240627 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20240527 Year of fee payment: 11 |